Aveva Aveva

Do you want an email whenever new security vulnerabilities are reported in any Aveva product?

Products by Aveva Sorted by Most Security Vulnerabilities since 2018

Aveva Edge10 vulnerabilities

Aveva System Platform9 vulnerabilities

Aveva Edge7 vulnerabilities

Aveva Suitelink6 vulnerabilities

Aveva Indusoft Web Studio5 vulnerabilities

Aveva Telemetry Server3 vulnerabilities

Aveva Batch Management3 vulnerabilities

Aveva Mobile Operator3 vulnerabilities

Aveva Work Tasks3 vulnerabilities

Aveva Recipe Management2 vulnerabilities

Aveva Plant Scada2 vulnerabilities

Aveva Pi Server2 vulnerabilities

Aveva Intouch Edge Hmi2 vulnerabilities

Aveva Intouch 20172 vulnerabilities

Aveva Intouch2 vulnerabilities

Aveva Historian2 vulnerabilities

Aveva Enterprise Licensing2 vulnerabilities

Aveva Communication Drivers2 vulnerabilities

Aveva Intouch 20201 vulnerability

Aveva Intouch 20141 vulnerability

Aveva Plant Scada1 vulnerability

By the Year

In 2024 there have been 2 vulnerabilities in Aveva with an average score of 6.4 out of ten. Last year Aveva had 12 security vulnerabilities published. Right now, Aveva is on track to have less security vulnerabilities in 2024 than it did last year. Last year, the average CVE base score was greater by 1.38

Year Vulnerabilities Average Score
2024 2 6.40
2023 12 7.78
2022 9 7.73
2021 7 7.54
2020 5 9.80
2019 3 8.70
2018 4 9.80

It may take a day or so for new Aveva vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Aveva Security Vulnerabilities

AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability

CVE-2023-31274 5.3 - Medium - January 18, 2024

AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to cause the PI Message Subsystem of a PI Server to consume available memory resulting in throttled processing of new PI Data Archive events and a partial denial-of-service condition.

Missing Release of Resource after Effective Lifetime

AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability

CVE-2023-34348 7.5 - High - January 18, 2024

AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.

Improper Handling of Exceptional Conditions

An issue was discovered in ExecuteCommand() in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior

CVE-2021-42796 9.8 - Critical - December 16, 2023

An issue was discovered in ExecuteCommand() in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior that allows unauthenticated arbitrary commands to be executed.

Path traversal vulnerability in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior

CVE-2021-42797 7.5 - High - December 16, 2023

Path traversal vulnerability in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior allows an unauthenticated user to steal the Windows access token of the user account configured for accessing external DB resources.

Directory traversal

An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior

CVE-2021-42794 5.3 - Medium - December 16, 2023

An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior. The application allows a client to provide a malicious connection string that could allow an adversary to port scan the LAN, depending on the hosts' responses.

This privilege escalation vulnerability, if exploited, cloud

CVE-2023-33873 7.8 - High - November 15, 2023

This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.

This external control vulnerability, if exploited, could

CVE-2023-34982 7.1 - High - November 15, 2023

This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.

Externally Controlled Reference to a Resource in Another Sphere

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000)

CVE-2022-28687 7.8 - High - March 29, 2023

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16257.

DLL preloading

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000)

CVE-2022-28688 7.8 - High - March 29, 2023

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17201.

DLL preloading

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000)

CVE-2022-28686 7.8 - High - March 29, 2023

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17114.

DLL preloading

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000)

CVE-2022-28685 7.8 - High - March 29, 2023

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of APP files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17212.

Marshaling, Unmarshaling

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 20.0 Build: 4201.2111.1802.0000 Service Pack 2

CVE-2022-36970 7.8 - High - March 29, 2023

This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 20.0 Build: 4201.2111.1802.0000 Service Pack 2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of APP files. Crafted data in a APP file can cause the application to execute arbitrary Visual Basic scripts. The user interface fails to provide sufficient indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of current process. Was ZDI-CAN-17370.

This vulnerability allows remote attackers to disclose sensitive information on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000)

CVE-2022-36969 7.1 - High - March 29, 2023

This vulnerability allows remote attackers to disclose sensitive information on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the LoadImportedLibraries method. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. Was ZDI-CAN-17394.

XXE

The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit which could

CVE-2023-1256 9.8 - Critical - March 16, 2023

The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit which could allow an unauthenticated user to remotely read data, cause denial of service, and tamper with alarm states.

AuthZ

AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit

CVE-2022-23854 7.5 - High - December 23, 2022

AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.

Directory traversal

AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may

CVE-2021-38410 7.8 - High - July 27, 2022

AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.

DLL preloading

Windows OS can be configured to overlay a language bar on top of any application

CVE-2022-1467 9.9 - Critical - May 23, 2022

Windows OS can be configured to overlay a language bar on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS.

Exposure of Resource to Wrong Sphere

AVEVA System Platform 2020 stores sensitive information in cleartext, which may

CVE-2022-0835 5.5 - Medium - April 11, 2022

AVEVA System Platform 2020 stores sensitive information in cleartext, which may allow access to an attacker or a low-privileged user.

Cleartext Storage of Sensitive Information

AVEVA System Platform versions 2017 through 2020 R2 P01 does not verify

CVE-2021-32977 7.2 - High - April 04, 2022

AVEVA System Platform versions 2017 through 2020 R2 P01 does not verify, or incorrectly verifies, the cryptographic signature for data.

Improper Verification of Cryptographic Signature

AVEVA System Platform versions 2017 through 2020 R2 P01 uses external input to construct a pathname

CVE-2021-32981 7.2 - High - April 04, 2022

AVEVA System Platform versions 2017 through 2020 R2 P01 uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Directory traversal

AVEVA System Platform versions 2017 through 2020 R2 P01 does not properly verify

CVE-2021-32985 7.2 - High - April 04, 2022

AVEVA System Platform versions 2017 through 2020 R2 P01 does not properly verify that the source of data or communication is valid.

Origin Validation Error

AVEVA System Platform versions 2017 through 2020 R2 P01 does not perform any authentication for functionality

CVE-2021-33008 9.8 - Critical - April 04, 2022

AVEVA System Platform versions 2017 through 2020 R2 P01 does not perform any authentication for functionality that requires a provable user identity.

Missing Authentication for Critical Function

An exception is thrown

CVE-2021-33010 7.5 - High - April 04, 2022

An exception is thrown from a function in AVEVA System Platform versions 2017 through 2020 R2 P01, but it is not caught, which may cause a denial-of-service condition.

Null pointer dereference in SuiteLink server while processing command 0x07

CVE-2021-32971 7.5 - High - September 23, 2021

Null pointer dereference in SuiteLink server while processing command 0x07

NULL Pointer Dereference

Null pointer dereference in SuiteLink server while processing commands 0x03/0x10

CVE-2021-32963 7.5 - High - September 23, 2021

Null pointer dereference in SuiteLink server while processing commands 0x03/0x10

NULL Pointer Dereference

Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a

CVE-2021-32979 7.5 - High - September 23, 2021

Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a

NULL Pointer Dereference

Null pointer dereference in SuiteLink server while processing command 0x0b

CVE-2021-32987 7.5 - High - September 23, 2021

Null pointer dereference in SuiteLink server while processing command 0x0b

NULL Pointer Dereference

Improper handling of exceptional conditions in SuiteLink server while processing command 0x01

CVE-2021-32999 7.5 - High - September 23, 2021

Improper handling of exceptional conditions in SuiteLink server while processing command 0x01

Improper Handling of Exceptional Conditions

Heap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06

CVE-2021-32959 9.8 - Critical - September 23, 2021

Heap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06

Heap-based Buffer Overflow

The vulnerability could expose cleartext credentials

CVE-2021-32942 5.5 - Medium - June 09, 2021

The vulnerability could expose cleartext credentials from AVEVA InTouch Runtime 2020 R2 and all prior versions (WindowViewer) if an authorized, privileged user creates a diagnostic memory dump of the process and saves it to a non-protected location.

Cleartext Storage of Sensitive Information

An SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053

CVE-2020-13499 9.8 - Critical - September 24, 2020

An SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. Parameter InstancePath in CHaD.asmx is vulnerable to unauthenticated SQL injection attacks.

SQL Injection

SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053

CVE-2020-13500 9.8 - Critical - September 24, 2020

SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. Parameter ClassName in CHaD.asmx is vulnerable to unauthenticated SQL injection attacks.

SQL Injection

An SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053

CVE-2020-13501 9.8 - Critical - September 24, 2020

An SQL injection vulnerability exists in the CHaD.asmx web service functionality of eDNA Enterprise Data Historian 3.0.1.2/7.5.4989.33053. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. Parameter InstanceName in CHaD.asmx is vulnerable to unauthenticated SQL injection attacks.

SQL Injection

Parameter AttFilterValue in ednareporting.asmx is vulnerable to unauthenticated SQL injection attacks

CVE-2020-13504 9.8 - Critical - September 24, 2020

Parameter AttFilterValue in ednareporting.asmx is vulnerable to unauthenticated SQL injection attacks. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. An attacker can send unauthenticated HTTP requests to trigger this vulnerability.

SQL Injection

Parameter psClass in ednareporting.asmx is vulnerable to unauthenticated SQL injection attacks

CVE-2020-13505 9.8 - Critical - September 24, 2020

Parameter psClass in ednareporting.asmx is vulnerable to unauthenticated SQL injection attacks. Specially crafted SOAP web requests can cause SQL injections resulting in data compromise. An attacker can send unauthenticated HTTP requests to trigger this vulnerability.

SQL Injection

AVEVA Wonderware System Platform 2017 Update 2 and prior uses an ArchestrA network user account for authentication of system processes and inter-node communications

CVE-2019-6525 8.8 - High - April 11, 2019

AVEVA Wonderware System Platform 2017 Update 2 and prior uses an ArchestrA network user account for authentication of system processes and inter-node communications. A user with low privileges could make use of an API to obtain the credentials for this account.

Credentials Management Errors

AVEVA Software

CVE-2019-6543 9.8 - Critical - February 13, 2019

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. Code is executed under the program runtime privileges, which could lead to the compromise of the machine.

Missing Authentication for Critical Function

AVEVA Software

CVE-2019-6545 7.5 - High - February 13, 2019

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. An unauthenticated remote user could use a specially crafted database connection configuration file to execute an arbitrary process on the server machine.

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2

CVE-2018-17916 9.8 - Critical - November 02, 2018

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. A remote attacker could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code to be executed. If InduSoft Web Studio remote communication security was not enabled, or a password was left blank, a remote user could send a carefully crafted packet to invoke an arbitrary process, with potential for code to be executed. The code would be executed under the privileges of the InduSoft Web Studio or InTouch Edge HMI runtime and could lead to a compromise of the InduSoft Web Studio or InTouch Edge HMI server machine.

Memory Corruption

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2

CVE-2018-17914 9.8 - Critical - November 02, 2018

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. This vulnerability could allow an unauthenticated user to remotely execute code with the same privileges as that of the InduSoft Web Studio or InTouch Edge HMI (formerly InTouch Machine Edition) runtime.

AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet

CVE-2018-10628 9.8 - Critical - July 24, 2018

AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process.

Buffer Overflow

AVEVA InduSoft Web Studio v8.1 and v8.1SP1

CVE-2018-10620 9.8 - Critical - July 19, 2018

AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code to be executed.

Memory Corruption

An Inadequate Encryption Strength issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior

CVE-2017-5160 5.3 - Medium - April 20, 2017

An Inadequate Encryption Strength issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. The software will connect via Transport Layer Security without verifying the peer's SSL certificate properly.

Inadequate Encryption Strength

An Information Exposure issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior

CVE-2017-5158 9.8 - Critical - April 20, 2017

An Information Exposure issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. Credentials may be exposed to external systems via specific URL parameters, as arbitrary destination addresses may be specified.

Information Disclosure

A Cross-Site Request Forgery issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior

CVE-2017-5156 8.8 - High - April 20, 2017

A Cross-Site Request Forgery issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. The client request may be forged from a different site. This will allow an external site to access internal RDP systems on behalf of the currently logged in user.

Session Riding

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 store cleartext OPC User credentials in a configuration file, which

CVE-2015-0999 - March 29, 2015

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 store cleartext OPC User credentials in a configuration file, which allows local users to obtain sensitive information by reading this file.

Information Disclosure

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 transmit cleartext credentials, which

CVE-2015-0998 - March 29, 2015

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 transmit cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network.

Information Disclosure

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 provide an HMI user interface

CVE-2015-0997 - March 29, 2015

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 provide an HMI user interface that lists all valid usernames, which makes it easier for remote attackers to obtain access via a brute-force password-guessing attack.

Information Disclosure

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files

CVE-2015-0996 - March 29, 2015

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive information by discovering this password.

Information Disclosure

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.